scholarly journals Use of Clinical Indicators in the Municipal Hospitals in Japan: An Analysis Based on a Nationwide Questionnaire Survey concerning Medical Information Management

2020 ◽  
Author(s):  
Yasutoshi Moteki ◽  
Kiyomi Hashimoto

We conducted a questionnaire survey of public hospitals across the country of Japan in order to analyze the issues and challenges concerning personal data protection faced by medical institutions managed by local municipalities in Japan. The reason for targeting public hospitals is that they are more closely related to the regional medical care plan. Questionnaires were sent to all municipal hospitals (887 hospitals with 20 or more beds that are members of the Japan Municipal Hospital Association: JMHA). Key parts of the findings were published as research material in another journal in 2018. This paper summarizes and analyzes the unpublished portion of the 2017 questionnaire survey by the authors. The analysis of the results focuses on the characteristics of the municipal hospitals surveyed and the use of clinical indicators compared by the size of hospitals. While many small and medium-sized hospitals use a common form of consent for the use of personal information, and many large hospitals have specific consent forms for each department (26.4%). Concerning primal method for disposing or deleting personal information, the most chosen item among small and medium-sized hospitals was the incineration or dissolution method (62.5%); the percentage of contractors outsourcing was relatively high in large hospitals (39.5%). In addition, we found the differences between large and small/medium hospitals concerning the use of the clinical indicators. The most used indicator is average length of hospitalization and the rate of hospital bed utilization (80.4%).

2020 ◽  
Author(s):  
Yasutoshi Moteki ◽  
Kiyomi Hashimoto

We conducted a questionnaire survey of public hospitals across the country of Japan in order to analyze the issues and challenges concerning personal data protection faced by medical institutions managed by local municipalities in Japan. The reason for targeting public hospitals is that they are more closely related to the regional medical care plan. Questionnaires were sent to all municipal hospitals (887 hospitals with 20 or more beds that are members of the Japan Municipal Hospital Association: JMHA). Key parts of the findings were published as research material in another journal in 2018. This paper summarizes and analyzes the unpublished portion of the 2017 questionnaire survey by the authors. The analysis of the results focuses on the characteristics of the municipal hospitals surveyed and the use of clinical indicators compared by the size of hospitals. While many small and medium-sized hospitals use a common form of consent for the use of personal information, and many large hospitals have specific consent forms for each department (26.4%). Concerning primal method for disposing or deleting personal information, the most chosen item among small and medium-sized hospitals was the incineration or dissolution method (62.5%); the percentage of contractors outsourcing was relatively high in large hospitals (39.5%). In addition, we found the differences between large and small/medium hospitals concerning the use of the clinical indicators. The most used indicator is average length of hospitalization and the rate of hospital bed utilization (80.4%).


2017 ◽  
Vol 17 (1) ◽  
pp. 45
Author(s):  
Endre Győző Szabó ◽  
Balázs Révész

A magánélet és a biztonság népszerű ellentétpárként tűnhet fel az adatvédelmi gondolkodásban. Leegyszerűsítve olvashatjuk sokszor, hogy ha bizonyos feltételek hiányoznak, aránytalanul nagy áldozatot hozhatunk a személyes magánszféra, a privacy oldalán a biztonság érdekében, és magánszféránk túlzott feláldozása a biztonság oltárán visszafordíthatatlan folyamathoz és orwelli világhoz vezet. Más, a biztonság szempontjait mindenek felettinek hirdető érvelésben viszont a személyes adatok védelmére való hivatkozást alkotmányjogi bűvészkedésnek csúfolják és igyekeznek kisebbíteni a magánszféra-védelem egyébként méltányolandó értékeit. A magánélet és a személyes adatok védelmének pedig nagy a tétje, az adatok illetéktelenek részére való kiszolgáltatása, rosszhiszemű felhasználása egzisztenciákat, családokat tehet tönkre, boldogulási lehetőségeket hiúsíthat meg, ha a védelem alacsony szintre süllyed. Másrészről pedig az információszerzés, illetve előzetes adatgyűjtés a különböző bűnelkövetések, terrorcselekmények előkészületi cselekményei is egyben. Azzal, ha a személyes adataink, magánszféránk védelmében ésszerű lépéseket teszünk, élünk a jog és a technológia adta védelmi lehetőségekkel, adatainkat nemcsak az államtól és a piaci szereplőktől, de a bűnözőktől is elzárjuk, és ezzel mindannyiunk biztonságát szolgáljuk. Egy terület tehát biztosan létezik, ahol a biztonság és magánszféra mezsgyéje összeér: az adatbiztonságé és ezzel összefüggésben a tudatos, felelős felhasználói attitűdé, aminek azonban sokszor az emberi tényező a gátja. Jelen tanulmányban a magánszféra és biztonság kérdéskörének komplexitásáról szólunk, és közös nevezőt keresünk az adatkezelések nézőpontjából, kitérve az új adatvédelmi rendelet (GDPR) magánszféránkat és biztonságunkat egyaránt szolgáló leendő jogintézményeinek bemutatására is. --- Data in security – security in our data? Privacy and security may be deemed as a popular dichotomy. It is often argued that even if security is vital, we might sacrifice too much of our privacy in return. This may be irreversible when it comes to the intrusiveness of surveillance. On the other hand, it is also sometimes argued that the importance of personal data protection deserves less attention than security. There is much at stake when it comes to privacy and the protection of personal data. Misuse of personal information may damage families’ lives and ruin people’s livelihoods, thus this may all have significant repercussions for society as a whole – this is the price to be paid if protection is at a low level. Using sophisticated measures that technology and legal regulations can provide, privacy can be protected. Data security is a common field for the protection of privacy and security – crucial for both endeavours to make people’s lives better. This essay describes the complexity of issues related to privacy and security, while also taking new legislation of the European Union into account.


2015 ◽  
pp. 1638-1652
Author(s):  
Panagiotis Kitsos ◽  
Aikaterini Yannoukakou

The events of 9/11 along with the bombarding in Madrid and London forced governments to resort to new structures of privacy safeguarding and electronic surveillance under the common denominator of terrorism and transnational crime fighting. Legislation as US PATRIOT Act and EU Data Retention Directive altered fundamentally the collection, processing and sharing methods of personal data, while it granted increased powers to police and law enforcement authorities concerning their jurisdiction in obtaining and processing personal information to an excessive degree. As an aftermath of the resulted opacity and the public outcry, a shift is recorded during the last years towards a more open governance by the implementation of open data and cloud computing practices in order to enhance transparency and accountability from the side of governments, restore the trust between the State and the citizens, and amplify the citizens' participation to the decision-making procedures. However, privacy and personal data protection are major issues in all occasions and, thus, must be safeguarded without sacrificing national security and public interest on one hand, but without crossing the thin line between protection and infringement on the other. Where this delicate balance stands, is the focal point of this paper trying to demonstrate that it is better to be cautious with open practices than hostage of clandestine practices.


2018 ◽  
Vol 9 (2) ◽  
pp. 229-237
Author(s):  
Andrzej Sprycha

In implementing their statutory tasks the Police can acquire a whole range of personal information, including sensitive data. This usually has a direct relation with combating crime. Therefore, such powers might be implemented without the knowledge and consent of persons to whom the information (data) concerns. Because police activities cause serious and profound intrusion into the sphere of a person’s private life, whose protection is guaranteed by the Constitution, they must be carried out within the limits strictly permitted by law. When discussing national regulations in force which control the issue of personal data protection, one must also take into consideration EU regulations. First of all the European Parliament and Council Regulation (EU) 2016/679 of 27th April 2016 on the protection of natural persons with regard to the processing of personal data and the European Parliament and Council Directive (EU) 2016/680 of 27th April 2016 on the protection of natural persons with regard to the processing of personal data. This directive, commonly known as the police directive, constitutes regulations on the protection of natural persons with regard to the processing of personal data by competent authorities for the purposes of prevention, investigation, detection and prosecution of criminal offences and execution of penalties. The national legislator faces a difficult task of implementation of the above-mentioned European legal acts, all the more so because the choice of particular solutions, to be adopted in their transposition to the legislative and implementing provisions, still remains an open issue. The adopted solutions ought to, on the one hand, ensure coherence with national regulations that implement them, on the other hand, they ought to cause the appropriate adjustment of the Polish law regulations to their requirements. The article presents the normative contents and remarks regarding appropriate, consistent with EU law processing of personal data by the Police.


Author(s):  
Mykola O. Yankovyi ◽  
Hanna V. Foros ◽  
Hanna V. Zaiets ◽  
Olena I. Pluzhnik

The purpose of the work was to identify the main legal parameters of modern information. As material sources of research at work, not only the Ukrainian regulations in the field of medical relations information are used, but also relevant innovations in the legal regulation of medical information relations, which are produced in the countries of the European Union. It is established that in the normative legal acts of Ukraine, unlike in European legislation, there is no division of information about an individual into general data and vulnerable personal data. The laws of Ukraine do not contain the notion of "public figure", whose limits of criticism, according to the European Court of Human Rights, are broader for an ordinary person. Among the main conclusions, it stands out that, in order to guarantee the freedoms and rights of citizens, it is necessary in the regulations to classify groups, lists of personal data and access to them based on the secret classification to avoid ambiguities. The materials in the article have practical value for graduates of higher education institutions of police and medical specialties, among others.


Author(s):  
A. Denker

Abstract. The project of smart cities has emerged as a response to the challenges of twenty-first- century urbanization. Solutions to the fundamental conundrum of cities revolving around efficiency, convenience and security keep being sought by leveraging technology. Notwithstanding all the conveniences furnished by a smart city to all the citizens, privacy of a citizen is intertwined with the benefits of a smart city. The development processes which overlook privacy and security issues have left many of the smart city applications vulnerable to non-conventional security threats and susceptible to numerous privacy and personal data spillage risks. Among the challenges the smart city initiatives encounter, the emergence of the smartphone-big data-the cloud coalescence is perhaps the greatest, from the viewpoint of privacy and personal data protection. As our cities are getting digitalized, information comprising citizens' behavior, choices, and mobility, as well as their personal assets are shared over smartphone-big data-the cloud coalescences, thereby expanding cyber-threat surface and creating different security concerns. This coalescence refers to the practices of creating and analyzing vast sets of data, which comprise personal information. In this paper, the protection of privacy and personal data issues in the big data environment of smart cities are viewed through bifocal lenses, focusing on social and technical aspects. The protection of personal data and privacy in smart city enterprises is treated as a socio-technological operation where various actors and factors undertake different tasks. The article concludes by calling for novel developments, conceptual and practical changes both in technological and social realms.


2020 ◽  
Vol 2 (2) ◽  
pp. 182-200
Author(s):  
Fenty Usman Puluhulawa ◽  
Jufryanto Puluhulawa ◽  
Moh. Gufran Katili

This study aims to discuss the legal weak protection of personal data which is motivated by the phenomenon of society today which is like living in a world without borders so that it impacts on easy access to one's personal information, the impact of begins to spread illegal practices by irresponsible parties in the illegal use of personal information. In addition, there are no laws that specifically regulate the protection of personal data/information in the 4.0 Industrial Revolution era. The approach method used is a conceptual and case approach, with the purpose of the research is to analyze the weakness of legal protection for personal data in the 4.0 Industrial Revolution era in Indonesia. The results of the study, the spread of personal data protection arrangements in various laws and regulations indicate the protection of personal data is not yet a national legal priority and results in legal weak protection of the personal data of citizens so as to position Indonesian citizens in a vulnerable position, which is certainly not in line with the legal objectives namely provide legal certainty, justice, and expediency. The various cases that exist and pay attention to the phenomenon of digitalization in the era of the industrial revolution 4.0 illustrate the urgency of the need for the legal protection of personal data a state priority. Legal reform through the legitimacy of protecting personal data as a responsive and progressive legal policy is a must so that legal protection in the form of legal guarantees can be carried out properly in order to create a safe and comfortable digital ecosystem for the community.


Author(s):  
Владимир Павлович Гулов ◽  
Виктор Анатольевич Хвостов ◽  
Владимир Петрович Косолапов ◽  
Галина Владимировна Сыч

Проведен анализ особенностей применения медицинских технологий, использующих мобильные приложения для повышения эффективности оказания медицинских услуг пациентам (мобильная медицина). На основе анализа уязвимостей характерных для мобильных систем и уязвимости медицинских информационных систем с мобильным доступом пациентов и сотрудников медицинской организации, новых атак, направленных на уязвимости мобильных технологий и протоколов сотовой связи и беспроводного доступа скорректированы цели безопасности и контекст безопасности организации. Для решения задач безопасности, возникающих при использовании технологий мобильной медицины, предложены типовая архитектура безопасности, способы защиты информации и проведен анализ возможных технических средств защиты. Целью архитектуры безопасности мобильной медицины является обеспечение конфиденциальности, целостности и доступности информационных ресурсов медицинской организации при доступе к ней с мобильных станций (смартфонов, планшетов, смарт устройств и т.п.). Основой архитектуры безопасности мобильной медицины могут являться средства обеспечения безопасности, такие как виртуальные частные сети, системы обнаружения вторжений, системы слежения за действиями пользователя, а также такие средства защиты информации как менеджер мобильных устройств и менеджер мобильных приложений The analysis of the features of the application of medical technologies using mobile applications to improve the efficiency of the provision of medical services to patients (mobile medicine) is carried out. Based on the analysis of vulnerabilities characteristic of mobile systems and the vulnerability of medical information systems with mobile access for patients and employees of a medical organization, new attacks aimed at vulnerabilities of mobile technologies and protocols of mobile communications and wireless access, the security objectives and the security context of the organization are adjusted. To solve the security problems arising from the use of mobile medicine technologies, a typical security architecture, methods for protecting information, and an analysis of possible technical means of protection are proposed. The purpose of the security architecture of mobile medicine is to ensure the confidentiality, integrity and accessibility of information resources of a medical organization when accessing it from mobile stations (Smartphone's, tablets, smart devices, etc.). The basis of the mobile medicine security architecture can be security tools such as virtual private networks, intrusion detection systems, user activity tracking systems, and information security tools such as a mobile device manager and mobile application manager


Author(s):  
Владимир Павлович Гулов ◽  
Виктор Анатольевич Хвостов ◽  
Айжана Михайловна Каднова ◽  
Галина Владимировна Сыч

На основе анализа практических аспектов защиты персональных данных при автоматизированной обработке в организациях здравоохранения определен круг проблем, касающихся потребительского качества систем защиты информации. Одной из главных проблем защиты персональных данных в медицинских информационных системах является обеспечение своевременной настройки систем защиты информации администратором в соответствии с установленной политикой в организации. При этом ключевой проблемой является формирование условий работы администратора обеспечивающих стопроцентную гарантию реакции администратора на поступление заявок по настройке систем защиты информации, управлению пользователями, правами доступа, парированию угроз различной природы. В условиях отсутствия в настоящее время методических подходов к оценке временных (вероятностных) параметров деятельности администратора безопасности медицинских информационных систем, известных как операционные характеристики систем защиты информации, обеспечить стопроцентное соответствие настроек систем защиты информации текущей политике проблематично. В статье предложен вероятностный показатель для оценки операционных характеристик систем защиты информации. Разработана методика его оценки на основе эксперимента по фиксации движения курсора мыши при выполнении основных действий администратором и распределения его внимания (тепловой карты) по элементам интерфейса системы защиты информации. Представлены результаты оценок операционных характеристик системы защиты информации «Страж NT 3.0», выполненные с использованием предложенной экспериментальной методики Based on the analysis of the practical aspects of personal data protection (PD) during automated processing in healthcare organizations, a range of problems related to the consumer quality of information protection systems (ISS) has been identified. One of the main problems of PD protection in medical information systems (MIS) is to ensure the timely configuration of the information security system by the administrator in accordance with the established policy in the organization. At the same time, the key problem is the formation of the administrator's working conditions that provide one hundred percent guarantee of the administrator's reaction to the receipt of requests for setting up the information security system, managing users, access rights, and countering threats of various nature. In the absence of methodological approaches to assessing the temporal (probabilistic) parameters of the MIS security administrator's activities, known as the operational characteristics of the ISS, it is problematic to ensure that the ISS settings are 100% consistent with the current policy. The article proposes a probabilistic indicator for assessing the operational characteristics of the information security system. A methodology for its assessment was developed on the basis of an experiment on fixing the movement of the mouse cursor when performing basic actions by the administrator and distributing his attention (heat map) among the elements of the information security interface. The results of evaluations of the operational characteristics of the SZI "Ctrazh NT 3.0" carried out using the proposed experimental method are presented


Author(s):  
A Lozhkova

The article discusses the development of personal data protection. Changes in the legal framework for the protection of personal data in healthcare institutions are analyzed. The necessity of applying a comprehensive approach to the issue of personal data protection is identified and justified, and a software package is proposed that will prevent the leakage of personal data.


Sign in / Sign up

Export Citation Format

Share Document